MI.CS.3B.NI.03
Learn moreDescribe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
MI.CS.3B.NI.04
Learn moreCompare ways software developers protect devices and information from unauthorized access.
MI.CS.3A.NI.04
Learn moreEvaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
MI.CS.3A.NI.05
Learn moreGive examples to illustrate how sensitive data can be affected by malware and other attacks.
MI.CS.3A.NI.06
Learn moreRecommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
MI.CS.3A.NI.07
Learn moreCompare various security measures, considering tradeoffs between the usability and security of a computing system.
MI.CS.3A.NI.08
Learn moreExplain tradeoffs when selecting and implementing cybersecurity recommendations.
MI.CS.2.NI.04
Learn moreModel the role of protocols in transmitting data across networks and the Internet.